Topic 2. Data Transmission Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is the structure of a data packet?

A

Packet Header
Payload
Trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the packet header contains?

A

The destination IP Address
Packet number
Sender’s address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the payload contain?

A

The actual chunk of data being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the process of packet switching?

A
  1. Data is broken down into packets
  2. Each packet is given a sequence number and sent on its way
  3. Each packet may take a different route to the next depending on the quickest route at the time
  4. Routers control the route that a packet takes
  5. Packets may arrive out of order. Once the last packet arrived, the sequence numbers are used to put them back into order. The data can then be reconstructed correftly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is serial transmission?

A

Data bits are sent one at a time down one cable
Very high data speeds can be achieved
Used with USB (Universal Serial Bus) interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of serial transmission?

A

Lower interference
More reliable over long distances
Smaller, simpler and cheaper connections to produce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the disadvantage of serial transmission?

A

Lower transmission speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is parallel transmission?

A

Several bits are sent simultaneously
Used with printer cables or internal device connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the advantages of parallel transmission?

A

Faster than serial transmission
Can send data in both directions at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the disadvantages of parallel transmission?

A

Can only be used over very short distances
Interference issues between wires
Data corruption can occur over longer distances
Data bits can move at different speeds causing them to arrive out of sync known as skewing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is simplex transmission?

A

Data travels in one direction only down a single cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can you use simplex transmission for?

A

Sending data from the computer to a monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is half-duplex transmission?

A

Data can travel in both directions along a single cable but not simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can you use half-duplex transmission for?

A

Used in parallel printer cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is duplex transmission?

A

Data can travel in both directions simultaneously using two communication channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can you use duplex transmission for?

A

Networking or Internet Cables to transmit and receive data at the same time.?

17
Q

How do parity checks detect errors in data transmission?

A

When sending a byte of data, one bit is used as the parity bit
Set to either 0 or 1 at the start to make the total numbers of 1s odd or even
The 1s are counted at the receiving end and if the wrong number of bits are 1 an error is detected and the data is resent

18
Q

How do parity block checks detect errors in data transmission?

A

A parity block check is used when sending multiple bytes in one transmission block.
Each byte will have its own parity bit
A final parity byte is used which contains a parity bit for each column
An error in the transmission can be detected but the exact position can be identified and corrected

19
Q

How do checksums detect errors in data transmission?

A

A checksum is calculated using an algorithm to sum all of the data to be sent in a transmission
The checksum is sent with the transmission and recalculated using the same method
If the starry and end sums do not match, the data has changed during transmission

20
Q

How does an echo check detect errors in data transmission?

A

An echo check is performed by asking the recipient computer to send back an exact copy of the data it has just received to the originator
The data is compared with what was originally sent
If both copies match, the data is deemed to have arrived without error

21
Q

How does ARQs detect errors in data transmission?

A

ARQs will automatically send back a positive acknowledgement if a data packet is deemed correct or they will ask for the data to be resent if an error has been detected
If no acknowledgement is returned within a certain time period, a timeout is registered and the sending computer resends the packet.
This process continues until the packet received is correct or until the ARQ limit is reached

22
Q

How do check digits detect errors in data transmission?

A

The check digit is an additional digit at the end of string of other numbers (commonly used in barcodes and ISBN numbers)
A check digit is recalculated on the data entry
If it matches with the one at the end of the number, the numbers are deemed correct

23
Q

How to calculate a check digit for an ISBN number

A

Multiply the ISBN numbers and the weight together
Add all the togethers
Find the remainder when the sum is divided by 10
Subtract the remainder from 10

24
Q

What is symmetric encryption?

A

Symmetric encryption (private key encryption) uses the same pre-shared key to encode and decode data
This means that the key must also be transferred to the recipient so that they can decrypt it

25
Q

What is asymmetric encryption?

A

Asymmetric encryption (public key encryption) uses two separate keys but related keys
A public key is shared with others and used by them to encrypt a message so it can only be deciphered by the intended recipient with their private key
(A private key must never be shared)